Skip to content

Doug Hurd Manager of Cisco Secure Technical Alliance discusses how to eliminate five common problems in security deployments.

  1. Maintain tools without taking down the network – as it is never a good time to take the network down a visibility fabric allows you to architect the network to avoid this
  2. Avoid blocking legitimate traffic.
  3. Filter out unneeded traffic saving time and money – Filtering traffic upstream of the appliance optimizes cost.
  4. Optimize the number and speed of ports.
    1. Too many network links to monitor and not enough ports
    2. Tool and network speed mismatches
  5. Decrypt SSL traffic externally to save money and share multiple tools

Listen to his talk here:

Related Posts

Bypass Switches: Ensuring Network Uptime and Security in High-Stakes Environments

Bypass Switches: Ensuring Network Uptime and Security in High-Stakes Environments

Modern Bypass Switches also offer granular control and flexible configurations, allowing administrators to choose whether the device should fail open…
Traceable Time as a Service - The Evolution of Precision Time

Traceable Time as a Service - The Evolution of Precision Time

Time is more than just a measure of seconds. It underpins the financial markets, telecommunications, cybersecurity, and every sector that…
Back in time packet capture and forensics with VIAVI Obeserver as a key component in a Zero Trust Network implementation

Back in time packet capture and forensics with VIAVI Obeserver as a key component in a Zero Trust Network implementation

Explore how packet capture and forensic analysis empower Zero Trust security implementations, ensuring network visibility and compliance.
TCXO, OCXO and Rubidium -- understanding oscillators and the role they play in precision time keeping

TCXO, OCXO and Rubidium -- understanding oscillators and the role they play in precision time keeping

Explore the differences between TCXO, OCXO, and Rubidium oscillators in precision timekeeping for telecommunications and industrial applications.
Mission-Critical Timing: The Transition from Spectracom to Safran

Mission-Critical Timing: The Transition from Spectracom to Safran

When it comes to critical operations whether in defense, public safety, telecommunications, or infrastructure, accurate, reliable time synchronization is non-negotiable.…